官术网_书友最值得收藏!

Reconnaissance

This is the most crucial phase of a CKC. The adversary will try to gather as much information as possible on the target. For example, an adversary can look for an organization's website for vulnerabilities or an employee's profile/email/credentials for a spear phishing or watering-hole attack. It can also dumpster dive to look for certain credentials and access keys in the target organization's network, Open Source Intelligence (OSINT), and so on.

You can find a really well-maintained list of tools and public online portals for gathering intel at this link: https://github.com/jivoi/awesome-osint
主站蜘蛛池模板: 修武县| 黄石市| 樟树市| 东台市| 如东县| 从化市| 全南县| 客服| 藁城市| 元氏县| 宁明县| 宿松县| 屯门区| 共和县| 普兰县| 张家界市| 翁源县| 西宁市| 东平县| 彰化市| 广宁县| 新疆| 通海县| 宝应县| 思南县| 黄浦区| 馆陶县| 金寨县| 拉孜县| 阳城县| 赤壁市| 华宁县| 许昌县| 焦作市| 上杭县| 南阳市| 邵武市| 巩义市| 乐昌市| 沭阳县| 灌云县|